Movate
20+ Pratham Education Foundation Interview Questions and Answers
Q1. TCP/IP layers, why is transport needed for communication? What is Subnet mask and how does it help in data communication. Why is Vlan needed? Based on what information does a switch and router send a packet or ...
read moreQuestions related to TCP/IP layers, subnet mask, VLAN, ARP, port number, IP and MAC addresses.
Transport layer is needed for reliable communication and error correction.
Subnet mask is used to identify the network and host portions of an IP address.
VLAN is needed for network segmentation and security.
Switches and routers send packets or frames based on destination IP address.
Types of ARP include ARP request and ARP reply.
Port number is used to identify the application or servic...read more
Q2. How will you manage a ticket
A ticket can be managed by following a systematic approach.
Acknowledge the ticket and assign it to the appropriate team member
Set a priority level based on the severity of the issue
Communicate with the customer and provide regular updates
Resolve the issue and close the ticket
Document the entire process for future reference
Q3. Ip phone boot up process
The IP phone boot up process involves several steps to initialize the device and connect to the network.
The phone powers on and performs a self-test
It obtains an IP address from the DHCP server
It downloads the firmware and configuration files from the TFTP server
It registers with the call manager or PBX
It is ready to make and receive calls
Q4. what are the Osi layers
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The seven layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
The Physical layer deals with the physical transmission of data, such as cables and network interfaces.
The Data Link layer provide...read more
Q5. Explain about SIP call flow
SIP call flow is the process of establishing, maintaining, and terminating a session initiated by Session Initiation Protocol (SIP).
SIP INVITE message is sent from the caller to the callee
Callee responds with a SIP 100 Trying message
Callee sends a SIP 180 Ringing message to indicate the phone is ringing
Callee sends a SIP 200 OK message to indicate the call is accepted
Media negotiation takes place between the caller and callee
Call termination is initiated by either party with ...read more
Q6. What is TCP/IP protocol
TCP/IP is a set of communication protocols used for connecting network devices and transmitting data over the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol
It is a suite of communication protocols used for connecting network devices
TCP is responsible for ensuring reliable transmission of data
IP is responsible for routing data packets between network devices
Examples of TCP/IP applications include web browsing, email, and file sharing
Q7. What is DND in networking
DND stands for 'Do Not Disturb' in networking.
DND is a feature that can be enabled on a device or network to prevent incoming calls or messages.
It is commonly used in VoIP systems to prevent incoming calls during important meetings or presentations.
DND can also be used to block incoming traffic on a network, such as during maintenance or security updates.
Q8. What is DHCP in network
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automatically assigning IP addresses to devices.
It eliminates the need for manual IP address configuration.
DHCP servers can also assign other network configuration information such as subnet mask, default gateway, and DNS server addresses.
DHCP leases are temporary and must be renewed periodically.
DH...read more
Q9. Diff b/w l3 switch and router
L3 switch is a switch with routing capabilities while a router is a dedicated device for routing.
L3 switch operates at layer 2 and layer 3 of the OSI model while a router operates only at layer 3.
L3 switch can perform routing functions like a router but also has the ability to switch frames between ports like a switch.
Routers are typically used to connect different networks while L3 switches are used to segment a network into smaller subnets.
Examples of L3 switches include Ci...read more
Q10. What is the difference between WAN and LAN?
WAN stands for Wide Area Network and covers a large geographical area, while LAN stands for Local Area Network and covers a small area like a home, office, or building.
WAN covers a larger geographical area, such as cities, countries, or even continents, while LAN covers a smaller area like a single building or campus.
WAN typically uses public infrastructure like leased lines, while LAN uses private infrastructure like Ethernet cables.
Examples of WAN technologies include MPLS,...read more
Q11. Which happens first tcp handshake or ssl handshake
SSL handshake happens before TCP handshake.
SSL handshake establishes a secure connection between client and server.
TCP handshake establishes a connection between client and server.
SSL handshake occurs after TCP handshake to secure the connection.
SSL handshake involves exchanging certificates and negotiating encryption algorithms.
TCP handshake involves SYN, SYN-ACK, and ACK packets to establish a connection.
Q12. Explain about each layer
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1 (Physical): Deals with the physical connection between devices and transmission of raw data.
Layer 2 (Data Link): Provides error-free transfer of data frames between nodes on the same network.
Layer 3 (Network): Handles the routing of data packets between different networks.
Layer 4 (Transport): Ensures reliable data transfer between end systems and provides flow control.
Layer 5 (Session): Esta...read more
Q13. How does a client get ip address
A client can get an IP address through DHCP (Dynamic Host Configuration Protocol) or by manually configuring it.
DHCP (Dynamic Host Configuration Protocol) assigns IP addresses automatically to clients on a network
Clients can also manually configure their IP address, subnet mask, gateway, and DNS server
IP addresses can be obtained through IPv4 or IPv6 protocols
Q14. Diff between native vlan and default vlan and DHCP process
Native VLAN is used for untagged traffic, default VLAN is used when no VLAN is specified, DHCP process involves client requesting IP address from server.
Native VLAN is used for untagged traffic on a trunk port
Default VLAN is used when no VLAN is specified, typically VLAN 1
DHCP process involves client sending a DHCP discover message, server offering an IP address, client requesting the offered IP address, and server acknowledging the request
Q15. What happens when we type www.google.com
When we type www.google.com, the browser sends a request to the DNS server to resolve the domain name into an IP address.
The browser sends a DNS query to the DNS server.
The DNS server looks up the IP address associated with the domain name.
The DNS server responds with the IP address.
The browser establishes a TCP connection with the IP address.
The browser sends an HTTP request to the IP address.
The server at the IP address responds with the Google homepage.
The browser renders ...read more
Q16. How two computers communicate each other
Two computers communicate by sending and receiving data packets over a network using protocols such as TCP/IP.
Computers communicate through a network by establishing a connection.
Data is divided into packets and sent over the network.
Protocols like TCP/IP ensure reliable delivery of packets.
Each computer has a unique IP address to identify it on the network.
Examples of communication methods include email, web browsing, and file sharing.
Q17. What is arp and how it works
ARP stands for Address Resolution Protocol. It is used to map IP addresses to MAC addresses on a local network.
ARP is used to find the MAC address of a device based on its IP address.
It works by broadcasting an ARP request packet on the local network asking for the MAC address associated with a specific IP address.
The device with the matching IP address responds with its MAC address, allowing communication to occur.
ARP cache is used to store the mappings of IP addresses to MA...read more
Q18. TCP 3 way handshake
TCP 3 way handshake is a process of establishing a connection between two devices over a network.
The client sends a SYN packet to the server
The server responds with a SYN-ACK packet
The client sends an ACK packet to the server to confirm the connection
This process is used to ensure reliable communication between devices
Q19. Explain Dhcp messages in detail.
DHCP messages are used for assigning IP addresses to devices on a network.
DHCPDISCOVER message is sent by a client to discover available DHCP servers
DHCPOFFER message is sent by a server to offer an IP address to a client
DHCPREQUEST message is sent by a client to request an offered IP address
DHCPACK message is sent by a server to acknowledge the IP address assignment to a client
DHCPNAK message is sent by a server to indicate that the requested IP address is not available
DHCPR...read more
Q20. Packet flow between same network
Packet flow between same network involves communication between devices within the same IP subnet.
Devices communicate directly without needing to go through a router.
Packet headers contain source and destination IP addresses for proper routing.
Switches forward packets based on MAC addresses within the same network.
Firewalls may inspect and filter packets within the same network.
Examples: File sharing between devices on the same LAN, printing to a network printer within the sa...read more
Q21. Packet flow between different network
Packet flow between different networks involves routing, switching, and encapsulation.
Packet travels from source device to destination device through routers and switches
Routers determine the best path for the packet based on routing tables
Switches forward the packet within the same network based on MAC addresses
Encapsulation involves adding headers and trailers to the packet at each network layer
Example: Packet from a computer in one network to a server in another network
Q22. What is VLAN ?
VLAN stands for Virtual Local Area Network, a network of devices that behave as if they are connected to the same physical network, even though they may be located on different segments.
VLANs are used to segment network traffic and improve network performance and security.
They allow for logical grouping of devices based on factors such as department, function, or security requirements.
VLANs can span multiple switches and routers, enabling flexibility in network design.
Example...read more
Q23. How does data flows?
Data flows through networks in packets, following a specific path determined by routing protocols and switches.
Data is broken down into packets before being transmitted over a network.
Each packet contains information such as source and destination addresses.
Routing protocols determine the best path for packets to reach their destination.
Switches forward packets based on MAC addresses.
Data flows through different network devices like routers, switches, and firewalls.
Q24. Explain Dns queries in detail.
DNS queries are requests sent by a client to a DNS server to resolve a domain name to an IP address.
DNS queries are sent over UDP or TCP port 53.
The query can be recursive or iterative.
Recursive query asks the DNS server to provide the final answer, while iterative query asks the server to provide the best answer it can.
DNS queries can be cached by the client or the server to improve performance.
DNS queries can also include additional information such as the type of record be...read more
Q25. Explain GPON architect
GPON architect is a passive optical network technology that uses fiber-optics to deliver high-speed internet access.
GPON stands for Gigabit Passive Optical Network.
It uses a point-to-multipoint architecture to provide fiber to the home or business.
GPON technology allows for high-speed internet access, VoIP, IPTV, and other services over a single fiber connection.
It uses a combination of OLT (Optical Line Terminal) at the service provider's end and ONT (Optical Network Termina...read more
Q26. OSI layers and it's purpose
OSI layers are a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
Physical layer - transmits raw data bits over a physical medium
Data link layer - provides error detection and correction
Network layer - routes data packets to their destination
Transport layer - ensures reliable data transfer
Session layer - establishes, maintains, and terminates connections
Presentation layer - translates data into a for...read more
Q27. Explain OSI model
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model
It helps in understanding how data is transferred over a network
Each layer has specific functions and interacts with adjacent layers
Examples of layers include physical layer, data link layer, network layer, etc.
Top HR Questions asked in Pratham Education Foundation
Interview Process at Pratham Education Foundation
Top Network Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month